CVE-2025-70220:
Critical stack buffer overflow in D-Link DIR-513 router allows remote code execution.
Score
A numerical rating that indicates how dangerous this vulnerability is.
9.8Critical- Published Date:Mar 4, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Exploitability
- Score:3.9
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Critical stack buffer overflow in D-Link DIR-513 router allows remote code execution.
Overview
The vulnerability in the D-Link DIR-513 router is a critical security issue with a CVSS v3.1 base score of 9.8. It is a stack-based buffer overflow, categorized as CWE-121. The flaw can be exploited remotely without requiring any user interaction or special privileges. Successful exploitation could lead to a full compromise of the router, potentially allowing an attacker to intercept or modify network traffic, use the router as a pivot point for further attacks, or render the device inoperable. Given the nature of the vulnerability and its attack vector, it poses a significant risk to both home and small business users of the affected D-Link router model.
Remediation
- As of the vulnerability disclosure, D-Link has not yet released a patch or official mitigation strategy. Users of the DIR-513 router should take the following precautions:
- 1. Monitor D-Link's security bulletin page for updates and patches.
- 2. Implement strong network segmentation to isolate the vulnerable router.
- 3. Disable remote administration features if not strictly necessary.
- 4. Use a firewall to restrict access to the router's management interface.
- 5. Regularly check for and apply firmware updates when available.
- 6. Consider replacing the affected router with a newer, more secure model if no patch is forthcoming.
- It is crucial for users to stay informed about the latest developments regarding this vulnerability and apply any security updates as soon as they become available from D-Link.
References
- [1] GitHub. "CVEreport/D-link/CVE-2025-70220." https://github.com/akuma-QAQ/CVEreport/tree/main/D-link/CVE-2025-70220
- [2] D-Link China. "DIR-513 Product Information." https://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-513
- [3] D-Link. "Security Bulletin." https://www.dlink.com/en/security-bulletin/
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.